Geofencing Components and Existing Models
Data(s) |
17/03/2010
|
---|---|
Resumo |
This paper describes the various Geofencing Components and Existing Models in terms of their Information Security Control Attribute Profiles. The profiles will dictate the security attributes that should accompany each and every Geofencing Model used for Wi-Fi network security control in an organization, thus minimizing the likelihood of malfunctioning security controls. Although it is up to an organization to investigate the best way of implementing information security for itself, by looking at the related models that have been used in the past this paper will present models commonly used to implement information security controls in the organizations. Our findings will highlight the strengths and weaknesses of the various models and present what our experiment and prototype consider as a robust Geofencing Security Model for securing Wi-Fi Networks |
Formato |
text |
Identificador |
http://roar.uel.ac.uk/1709/1/IMECS2010_pp823-828.pdf Ijeh, Anthony C. and Preston, David and Imafidon, Chris O. and Watmon, Titus Bitek and Uwaechie, Annette O. and Nwabude, Aaron Aniagolu and Kujabi, Ebrina (2010) ‘Geofencing Components and Existing Models’, Lecture Notes in Engineering and Computer Science, 2181(1), pp. 823-828. |
Relação |
http://roar.uel.ac.uk/1709/ |
Tipo |
Article PeerReviewed |